US20120281525A1 - METHOD AND SYSTEM FOR PRIORITY BASED (1:1)n ETHERNET PROTECTION - Google Patents
METHOD AND SYSTEM FOR PRIORITY BASED (1:1)n ETHERNET PROTECTION Download PDFInfo
- Publication number
- US20120281525A1 US20120281525A1 US13/101,615 US201113101615A US2012281525A1 US 20120281525 A1 US20120281525 A1 US 20120281525A1 US 201113101615 A US201113101615 A US 201113101615A US 2012281525 A1 US2012281525 A1 US 2012281525A1
- Authority
- US
- United States
- Prior art keywords
- path
- flow
- working
- priority
- flows
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/55—Prevention, detection or correction of errors
- H04L49/557—Error correction, e.g. fault recovery or fault tolerance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/35—Switches specially adapted for specific applications
- H04L49/351—Switches specially adapted for specific applications for local area network [LAN], e.g. Ethernet switches
Definitions
- the present disclosure relates generally to Ethernet networks and, more particularly, to a method and system to protect several working Ethernet flows that have a common protection path by assigning priority to each of the working flows.
- Ethernet networks to rapidly convey large amounts of information between remote points.
- information is conveyed in the form of frames through fiber optic electrical connections, for example.
- Ethernet networks can be used to implement Local Area Networks (LANs).
- LANs Local Area Networks
- Vans Virtual Local Area Networks
- Vans can group, physically disparate network elements together to operate with a common set of requirements as if they were attached to the same domain.
- An Ethernet network handles a large amount of data from multiple points in the network.
- the bandwidth of a network is finite and determines the amount of data that can be communicated at any given time.
- Common issues with networks are loss of data or connection due to a line failure.
- a service provider may experience disruptions in data transmission or slow downs of data transmission to multiple clients.
- the disruption of data flow may impact business costs due to lost working time.
- clients expect a high level of service and minimal loss of data.
- a current solution to the issues of lost data and the need for a higher level of service is to provide an alternate path, called a protection path, that is available for re-routing data when there is a failure in the primary path, called a working path.
- Disadvantages of the protection path are inefficient use of network bandwidth, lack of predictability of which data path or flow will be on the protection path during a multiple fail scenario, no opportunities to optimize bandwidth of the network, and limited ability of service providers to offer improved service level agreements (SLA).
- SLA service level agreements
- a method and system for priority based Ethernet protection may include protecting multiple working Ethernet flows which share a common protection path by assigning a priority to each of the working flows on each of the working paths.
- the method and system may further include determining the available bandwidth on a protection path upon failure of the working paths.
- the method and system may additionally include determining the priority of the flows on the failed working paths.
- the method and system may include switching two or more flows to the protection paths based at least on the priority of the flows, the bandwidth of the flows in the working path and the available bandwidth on the protection path.
- Technical advantages of one or more embodiments of the present disclosure may include the ability to assign priorities to flows associated with the working paths of Ethernet connections. If service providers or IT departments can assign priorities to the flows, then during multiple working path failure conditions there will be no interruptions of critical data transmissions.
- Technical advantages of one or more embodiments of the present disclosure may also include the ability to service multiple working path failures.
- the bandwidth of the protection path is sufficient, the traffic on more than one path can be assigned to the protection path during multiple failure conditions.
- the priority of the flow and its associated bandwidth may determine whether the flow on the failed working path will be switched to the protection path.
- having the flows of multiple failed working paths switched to the protection path may also allow for optimization of bandwidth usage.
- a service provider may be able to offer multiple levels of service through assigning priorities to flows and servicing multiple working path failures. They may be able to charge clients for this higher level of service and a service provider could see increased profits and clients could ensure a certain level of service.
- critical data systems would receive uninterrupted service.
- FIG. 1 is a block diagram illustrating a (1:1) n protection architecture in a network
- FIG. 2 is an illustration of the Automatic Protection Switching (APS) Frame used in the protection architecture of FIG. 1 ;
- APS Automatic Protection Switching
- FIG. 3 is a block diagram illustrating an embodiment for a priority based (1:1) n protection scheme in a network, according to a particular embodiment of the present disclosure
- FIG. 4 is an illustration of an example APS Frame for according to a particular embodiment of the present disclosure
- FIG. 5 is an illustration of another example APS Frame according to a particular embodiment of the present disclosure.
- FIG. 6 is a block diagram illustrating an example of the network of FIG. 3 when a single working path fails, according to a particular embodiment of the present disclosure
- FIG. 7 is a block diagram illustrating the operation of the network of FIG. 3 when a second working path fails, according to a particular embodiment of the present disclosure
- FIG. 8 is a block diagram illustrating the operation of the network of FIG. 3 when a third working path fails but its flow is not admitted to the protection path, according to a particular embodiment of the present disclosure
- FIG. 9 is a block diagram illustrating the operation of the network of FIG. 3 when a working path recovers and a pending flow from a previous working path failure is admitted according, to a particular embodiment of the present disclosure
- FIG. 10 is a block diagram illustrating the operation of the network of FIG. 3 when a working path with a higher priority flow fails and a lower priority flow is dropped, according to a particular embodiment of the present disclosure.
- FIG. 11 is a block diagram illustrating an example method for protection switching, according to a particular embodiment of the present disclosure.
- FIG. 1 is an example of a current (1:1) n protection architecture in a network as described in the ITU-T G808.1 specification.
- a network may include a plurality of network elements configured to transmit data on a plurality of working paths coupled to the network elements.
- the network includes network elements or nodes 100 that are communicatively coupled via working paths 120 and protection path 150 .
- any suitable configuration of any suitable number of network elements 100 may create the network.
- the network elements 100 may be located in similar or geographically disparate locations.
- the network is shown as a logical point-to-point network, the network may also be configured as a ring network, mesh network, or any other suitable network or combination of networks.
- Network elements may be coupled via optical fiber, an Ethernet cable, a WiFi signal, or other suitable medium.
- Network elements 100 a and 100 b may exchange data transmissions (flows), Continuity Check Messages (CCM) and Automatic
- CCMs are uni-directional, broadcast messages that provide a means to check connectivity of paths in a network.
- Each working path and protection path has a unique CCM signal between network elements 100 .
- the APS signal is a frame that contains information specific to the protection scheme and to switching data from the working path to the protection path.
- the APS signal may be transmitted periodically on the protection path 150 during normal operation. When a working path failure occurs, the APS frame may be immediately transmitted between the network elements bounding the path. When there is a need to switch a flow 110 from a working path 120 to a protection path 150 , the APS frame may perform the handshaking between network elements 100 .
- each working path has an associated flow.
- Flows 110 are the traffic or data transmitted on the working paths 120 and protection path 150 .
- Such traffic may comprise optical or electrical signals configured to encode audio, video, textual, and/or any other suitable data.
- each working path has a finite bandwidth.
- working path 120 a has 400 MB
- working path 120 b has 200 MB
- working path 120 c has 100 MB
- working path 120 d has 100 MB.
- Protection path 150 has a bandwidth equal to the bandwidth of the largest working path bandwidth that it is protecting.
- the protection path 150 has bandwidth of at least 400 MB, which is the bandwidth of highest bandwidth working path 120 a.
- the bandwidth of each working path and the protection path may be any value suitable to meet the data transmission needs.
- only one working path may be protected at a time. In the case of multiple working path failures, certain flows will not be protected.
- FIG. 2 is an illustration of the Automatic Protection Switching (APS) Frame for current protection schemes.
- Automatic Protection Switching is described in the ITU-T G.8031 specification and further defined in Telcordia GR-253.
- the ITU-T G.808.1 specification defines a required communication channel called the protection path or protection flow between two network elements. It is separate from the working entity or path and is used to synchronize the two network elements defining the boundaries of the protection path.
- the APS specific information is the following: Request/State 300 , Protection Type 310 , Requested Signal 320 and Bridged Signal 330 as defined in the ITU-T G.8031 specification. There is also a Reserved Field 340 that is not currently defined in the ITU-T G.8031 specification.
- the Request/State 300 is a four bit field which indicates the type of request in the switching algorithm.
- the Request/State 300 may be “Forced Switch” as indicated by 1101 in the field or “Wait to Restore” as indicated by 0101 in the field.
- the Protection Type 310 (A and B bits) indicates to the network if Automatic Protection Switching is active and what type of protection scheme is active. The D bit provides further detail so that the network elements 100 know whether the data flow switched to the protection path is uni-directional or bi-directional.
- the Requested Signal 320 indicates the request by the near end node to be switched over to the protection path.
- the Bridged Signal 330 indicates that the signal is switched by the near end node over the protection path.
- the Requested Signal 320 and the Bridged Signal 330 allow the network elements 100 a and 100 b to remain synchronized when switching a flow from a failed working path to the protection path.
- the APS mechanism may activate.
- An APS frame may be sent between network elements 100 to ensure that each node agrees to switch the traffic or flow from the working path failure to the protection path.
- network element 100 a may send an
- Network element 100 b receives the APS frame and returns an APS frame with the “Requested Signal” 320 bit set.
- Network element 100 a responds with another APS frame with both the “Requested Signal” 320 and the “Bridged Signal” 330 set.
- Network element 100 b receives the frame and responds with an APS frame with the same bits set. With the appropriate bits in the APS frame set, the network elements 100 are in agreement and the data switch occurs.
- the CCM signal for the working path with a failure may continue to be monitored. Once the CCM signal restores, a “Wait to Restore” will be set in the APS frame “Request/State” 300 field and the process described above may be repeated but the bits may be un-set instead of set.
- FIG. 3 is a block diagram illustrating an embodiment for a (1:1) n priority based protection scheme in a network.
- multiple working paths may be protected and unique priorities may be assigned to the flows associated with each working path.
- the network is communicatively coupled via working paths 220 and protection path 250 through network elements 200 .
- the working paths grouped with a particular protection path may be defined in the software of network elements 200 .
- the working paths grouped with a particular protection path may be defined in hardware of network elements 200 .
- Flows 210 are the data transmitted on the working paths 220 .
- the working paths 220 in FIG. 3 have a finite bandwidth and the flows 210 have a unique priority.
- working paths 220 have the following bandwidth and priority: working path 220 a has 400 MB and Priority 1 , working path 220 b has 200 MB and Priority 2 , working path 220 c has 100 MB and Priority 3 , and working path 220 d has 100 MB and Priority 4 .
- Protection path 250 may have a bandwidth greater than or equal to the sum of the bandwidth of the largest working path bandwidth that it is protecting and the APS frame bandwidth. In this example, the protection path 250 has a bandwidth of 500 MB which is greater than the 400 MB bandwidth of working path 220 a. In general, the protection path bandwidth may be greater than or equal to the bandwidth of the largest working path.
- the network elements 200 a and 200 b shown in FIG. 3 may be located in similar or geographically disparate locations.
- the network elements 200 a and 200 b may also define the boundaries of the protection path.
- Network elements 200 may be a switch with a single network card or a distributed switch with multiple network cards.
- the network cards in network elements 200 may have Ethernet ports and processing resources.
- the configuration of the network may be defined.
- Each network element may have the working paths and the protection path defined as well as the bandwidth of each path stored.
- an APS State Machine Module (SMM), a Configuration Module and a Flow Admission Module (FAM), not explicitly shown may be present on the processing resources within the network elements.
- SMM APS State Machine Module
- FAM Flow Admission Module
- the APS State Machine Module (SMM) and Flow Admission Module (FAM) are the mechanism for supporting traffic switching from the working path to the protection path.
- the Configuration Module assigns the priority of the flow on the working path.
- the SMM is the state machine that facilitates sending the APS frame between network elements negotiating a switch to the protection path.
- the FAM tracks the status of the protection path in terms of priority and bandwidth and stores the bandwidth of the working paths grouped with the protection path.
- the FAM may be similar to a Connection Admission Control (CAC) algorithm that determines whether connections should be allowed based on sufficient resource availability.
- CAC Connection Admission Control
- the FAM and SMM may facilitate protecting more than one working path at a time.
- assigned priorities and available/required bandwidth may be used as decision criteria in the FAM when deciding which flow to protect.
- the flows 210 from the working paths 220 may be admitted to the protection path 250 in decreasing order of priority. If the bandwidth of the protection path 250 is fully utilized, the priority of the flow from the newly failed working path 220 may be used to pre-empt existing lower priority flows on the protection path 250 .
- the SMM When a working path 220 with the higher priority flow is restored, then the lower priority flow from working paths 220 with the failure will be given an opportunity to have the flow 210 be admitted on to the protection path 250 , provided the required bandwidth is available.
- the SMM Once the SMM has determined the traffic to allow on the protection path, the SMM will initiate APS frames to begin the switch of flows 210 from the failed working path 220 to the protection path 250 . This will be described in further detail in the descriptions of the Figures below.
- the working paths 220 may have a Continuity Check Message (CCM) to indicate current status.
- CCM Continuity Check Message
- the CCM is a standard Ethernet mechanism as described in IEEE 802.1ag that detects and signals connectivity failures, as described in FIG. 1 .
- the CCM signal may be monitored and generated by a Fault Detection Module (FDM), not explicitly shown, that may be present on the processing resources of the network elements 200 .
- FDM Fault Detection Module
- a CCM signal may be broadcast, as an example, at a periodic rate of 3.3 ms.
- the CCM may be monitored to determine if a flow 210 needs to be switched to the protection path 250 .
- a failure of the CCM signal may be defined as a minimum of three missed CCM broadcasts.
- the APS signals for each working path 220 are transmitted by the APS State Machine Module (SMM) on the protection path 250 when their associated working path has failed.
- SMM APS State Machine Module
- the APS signals in the example embodiment are based on the ITU-T G.8031 specification, as illustrated in FIG. 2 .
- APS signal may be augmented to include information that creates an Flow Identifier (Flow ID) for a flow associated with a particular working path, as described below in conjunction with FIG. 4 .
- Flow ID Flow Identifier
- the APS frame for each flow 210 is transmitted on the protection path 250 .
- FIG. 4 is an illustration of an example APS frame, according to a particular embodiment of the present disclosure.
- the 4th byte in the APS specific information may be used to carry the Flow ID 440 to represent a specific flow.
- the Flow ID 440 may also be used to define the priority of the flow.
- the A bit shows that the APS mechanism will be used in the protection scheme (1:1) as indicated in bit B.
- the D bit set as bi-directional indicates that a working path failure will have both directions of data flow switched to the protection path.
- the R bit indicates that if a flow is present on a protection path, it will return to the working path if the path is restored.
- the Requested Signal 420 and the Bridged Signal 430 may be a 0 or 1 to indicate a request and a transition to the protection path. These two bits may be used as a handshaking mechanism to allow to nodes of a network to negotiate switching a flow from the working path to the protection path.
- FIG. 5 is an illustration of the APS Frame for communicating APS information for multiple flows, according to a particular embodiment of the present disclosure.
- TLV Type-Length-Value
- End TLV 510 portion of the frame
- multiple APS signal information may be transmitted together on the protection path to facilitate multiple flows sharing a protection path.
- the TLV Offset 500 separates the APS frames for a specific flow.
- the Flow ID 540 may identify the flow associated with this frame.
- the End TLV 510 field indicates that end of the grouping of APS frames.
- four working paths share a protection path.
- the APS signals associated with each flow may be transmitted periodically on the protection path. When a working path fails, the APS frame associated with its flow may have the appropriate bits set to begin the handshake mechanism between network elements. The non-failing working path APS frames may be unaffected.
- FIG. 6 is a block diagram illustrating an example of the network of FIG. 3 when a single working path fails according to a particular embodiment of the present disclosure.
- a failure occurs in working path 220 c as indicated by a loss of CCM signal.
- the APS mechanism in the SMM is activated and communicates with the FAM to determine if there is bandwidth available.
- the FAM determines that working path 220 c has 100 MB of bandwidth. Since this is less than the 500 MB bandwidth of the protection path and no other traffic is on the protection path, the FAM allows the flow 210 c from working path 220 c to switch to the protection path 250 regardless of the priority reflected in its APS signal.
- the FAM communicates to the SMM that the switch may occur.
- the SMM sends an APS frame from network element 200 a to network element 200 b that has the “Requested Signal” bit set.
- Network element 200 b receives the APS frame and returns an APS frame with the “Requested Signal” bit set.
- Network element 200 a responds with another APS frame with both the “Requested Signal” and the “Bridged Signal” set.
- Network element 200 b receives the frame and responds with an APS frame with the same bits set. With the appropriate bits in the APS frame set, the network elements 200 are in agreement and the data switch occurs.
- the available bandwidth on the protection path 250 is 400 MB.
- the protection scheme is revertive therefore the CCM signal on the working path 220 c is constantly monitored. If the CCM is restored, thus indicating recovery of the working path, then the traffic would return to the working path.
- FIG. 7 continues illustrating the example of the network of FIG. 6 when a second working path fails according to a particular embodiment of the present disclosure.
- working path 220 c has already failed and the flow 210 c has been admitted to the protection path 250 .
- a failure now occurs in working path flow 220 d as indicated by a loss of CCM signal.
- the FAM determines that working path 220 d has 100 MB of bandwidth and the protection path has 400 MB of available bandwidth. Since the protection path bandwidth is sufficient (400 MB >100 MB), the FAM allows working path 220 d to be admitted to the protection path 250 regardless of the priority.
- the FAM indicates to the SMM to initiate the switch of traffic from the failed working path to the protection path.
- the traffic switch occurs with the APS frames as described in FIG. 6 . There is now 300 MB of available bandwidth on protection path 250 .
- FIG. 8 continues illustrating the example of the network of FIG. 6 when a third working path fails according to a particular embodiment of the present disclosure.
- working path 220 c and working path 220 d have already failed and been admitted to the protection path 250 .
- the SMM sends a request to the FAM to switch.
- the FAM determines that working path 220 a has a 400 MB bandwidth requirement which is larger than the available bandwidth (300 MB) of the protection path 250 .
- the FAM compares the priorities of the traffic from working paths 220 c, 220 d and 220 a and determines that the new failure on working path 220 a has the lowest priority signal so it is not admitted to the protection path 250 .
- the SMM sends a request to the FAM to switch.
- the FAM determines that working path 220 a has a 400 MB bandwidth requirement which
- the FAM denies the switch and places the working path failure in the pending state for the protection path.
- the SMM sends an APS frame between network elements 200 a and 200 b noting the denial in the “Request/State” field.
- the flow 210 a from working path 220 a is not transmitted during the time it is in the pending state.
- the protection architecture does not track or maintain any knowledge of the data while the working path is in the fail condition.
- the CCM signal may be monitored to determine whether the working path is repaired and monitor the availability of the protection path in order to create a link for data transmission.
- FIG. 9 continues illustrating the example of the network of FIG. 10 when a working path recovers and a pending flow from a previous failed working path is admitted to the protection path according to a particular embodiment of the present disclosure.
- working path 220 c and working path 220 d have already failed and their flows, 210 c and 210 d respectively, have been admitted to the protection path 250 .
- the flow's 210 a admittance to the protection path 250 is pending due to insufficient bandwidth and lower priority.
- the protection scheme is revertive therefore the CCM signal on the working path 220 c may be constantly monitored.
- the FAM recognizes that working path 220 c has recovered and communicates to the SMM to initiate the traffic switch back to the working path.
- the SMM sends an APS frame with “Wait to Restore” set in the “Request/State” field between network elements 200 .
- Network element 200 a sends an APS frame to network element 200 b with the Requested Signal field set to zero.
- Network element 200 b responds with an APS frame with the Bridged Signal and Requested Signal set to zero.
- Working path 220 c is now transmitting flow 210 c.
- the FAM recalculates the available bandwidth on the protection path and determines that there is now 400 MB of bandwidth available. Prior to working path 220 c recovering, there was 300 MB of available bandwidth on the protection path 250 and, since flow 210 c required 100 MB of bandwidth, there is now 400 MB of bandwidth available on the protection path 250 . The FAM determines that the pending data from working path 220 a can now be admitted since there is sufficient bandwidth on the protection path and no other higher priority fails pending. Once flow 210 a is admitted, there is zero bandwidth available on the protection path 250 .
- the FAM notifies the SMM to begin switching the traffic of working path 220 a to the protection path.
- the switch of flow 210 a to the protection path 250 occurs as described in the figures above.
- FIG. 10 continues illustrating the example of the network of FIG. 9 when a working path with a higher priority flow fails and a lower priority flow is dropped from the protection path according to a particular embodiment of the present disclosure.
- working path 220 c and working path 220 d have already failed and their respective flows have been admitted to the protection path 250 .
- Working path 220 a was pending until working path 220 c recovered and then flow 210 a was admitted to the protection path.
- the FAM determines that flow 210 b has a higher priority than flow 210 a which is already transmitting on the protection path.
- the FAM also determines that if flow 210 a is dropped, there will be sufficient bandwidth for flow 210 b.
- the SMM initiates the APS mechanism and sends APS frames on the protection path 250 for working path 220 a between network elements 200 with the appropriate bits in the “Request State” field set as described in the ITU-T G.8031 specification.
- the SMM notes that working path 220 a is not functional so it will be in the pending state.
- Flow 210 b will be admitted to the protection path with the APS handshaking mechanism described above.
- FIG. 11 is a block diagram illustrating an example method for protection switching, according to a particular embodiment of the present disclosure.
- the working paths are functional and monitored periodically to determine if there is a failure.
- step 304 if one or more failures have occurred there is a check for sufficient bandwidth. If there is sufficient bandwidth, then the flow(s) are switched to the protection path in step 306 .
- step 307 the available bandwidth on the protected path is recalculated.
- step 308 the state of the failed working paths is monitored. If the failed path recovers, then the flow reverts back to the working path in step 310 .
- the amount of available bandwidth on the protected path may be updated.
- step 311 after the available bandwidth is updated, the pending flows will be checked in step 316 . If there are pending flows in 316 , then the process will continue at step 304 . If there is not sufficient bandwidth in 304 , then in step 312 , the priority of the flows is determined. In step 314 , if the newly failed flow is higher priority than one or more of flows currently on the protection path, determine in step 318 if dropping one or more of them provides sufficient bandwidth for the higher priority failed flow. If yes, then the lower priority failures are dropped in step 320 and placed in the pending queue to make room for the higher priority failed flow and the higher priority flow is switched to the protection path in step 306 .
- step 313 If not, the current failure is in the pending state in step 313 and will be monitored in step 316 for admittance to the protection path. In addition at step 314 , if the new failure is not higher priority than the current fails on the protection path, then the latest failure is pending in step 313 until sufficient bandwidth is available as determined in step 304 .
- FIG. 11 discloses a particular number of steps to be taken with respect to the method of implementing priority based Ethernet protection, the steps may be executed with more or fewer steps than those depicted in FIG. 11 .
- FIGS. 5 through 10 disclose a certain order of steps that may be taken with respect to the method implementing priority based Ethernet protection, the steps comprising the method of implementing priority based Ethernet protection may be completed in any suitable order.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The present disclosure relates generally to Ethernet networks and, more particularly, to a method and system to protect several working Ethernet flows that have a common protection path by assigning priority to each of the working flows.
- Telecommunications systems and data communication networks use Ethernet networks to rapidly convey large amounts of information between remote points. In an Ethernet network, information is conveyed in the form of frames through fiber optic electrical connections, for example. Ethernet networks can be used to implement Local Area Networks (LANs). Virtual Local Area Networks (Vans) can group, physically disparate network elements together to operate with a common set of requirements as if they were attached to the same domain.
- An Ethernet network handles a large amount of data from multiple points in the network. The bandwidth of a network is finite and determines the amount of data that can be communicated at any given time. Common issues with networks are loss of data or connection due to a line failure. For example, a service provider may experience disruptions in data transmission or slow downs of data transmission to multiple clients. The disruption of data flow may impact business costs due to lost working time. As technology continues to improve, clients expect a high level of service and minimal loss of data.
- A current solution to the issues of lost data and the need for a higher level of service is to provide an alternate path, called a protection path, that is available for re-routing data when there is a failure in the primary path, called a working path. Disadvantages of the protection path are inefficient use of network bandwidth, lack of predictability of which data path or flow will be on the protection path during a multiple fail scenario, no opportunities to optimize bandwidth of the network, and limited ability of service providers to offer improved service level agreements (SLA).
- In accordance with a particular embodiment of the present disclosure, a method and system for priority based Ethernet protection is presented. The method and system may include protecting multiple working Ethernet flows which share a common protection path by assigning a priority to each of the working flows on each of the working paths. The method and system may further include determining the available bandwidth on a protection path upon failure of the working paths. The method and system may additionally include determining the priority of the flows on the failed working paths. Moreover, the method and system may include switching two or more flows to the protection paths based at least on the priority of the flows, the bandwidth of the flows in the working path and the available bandwidth on the protection path.
- Technical advantages of one or more embodiments of the present disclosure may include the ability to assign priorities to flows associated with the working paths of Ethernet connections. If service providers or IT departments can assign priorities to the flows, then during multiple working path failure conditions there will be no interruptions of critical data transmissions.
- Technical advantages of one or more embodiments of the present disclosure may also include the ability to service multiple working path failures. In particular embodiments, if the bandwidth of the protection path is sufficient, the traffic on more than one path can be assigned to the protection path during multiple failure conditions. The priority of the flow and its associated bandwidth may determine whether the flow on the failed working path will be switched to the protection path. Also, having the flows of multiple failed working paths switched to the protection path may also allow for optimization of bandwidth usage.
- Technical advantages of one or more embodiments of the present disclosure may also allow for an improved business model and level of service for clients. A service provider may be able to offer multiple levels of service through assigning priorities to flows and servicing multiple working path failures. They may be able to charge clients for this higher level of service and a service provider could see increased profits and clients could ensure a certain level of service. In addition, in an office environment, critical data systems would receive uninterrupted service.
- It will be understood that the various embodiments of the present disclosure may include some, all, or none of the enumerated technical advantages. In addition, other technical advantages of the present disclosure may be readily apparent to one skilled in the art from the figures, description and claims included herein.
- For a more complete understanding of the present disclosure and its features and advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a block diagram illustrating a (1:1)n protection architecture in a network; -
FIG. 2 is an illustration of the Automatic Protection Switching (APS) Frame used in the protection architecture ofFIG. 1 ; -
FIG. 3 is a block diagram illustrating an embodiment for a priority based (1:1)n protection scheme in a network, according to a particular embodiment of the present disclosure; -
FIG. 4 is an illustration of an example APS Frame for according to a particular embodiment of the present disclosure; -
FIG. 5 is an illustration of another example APS Frame according to a particular embodiment of the present disclosure; -
FIG. 6 is a block diagram illustrating an example of the network ofFIG. 3 when a single working path fails, according to a particular embodiment of the present disclosure; -
FIG. 7 is a block diagram illustrating the operation of the network ofFIG. 3 when a second working path fails, according to a particular embodiment of the present disclosure; -
FIG. 8 is a block diagram illustrating the operation of the network ofFIG. 3 when a third working path fails but its flow is not admitted to the protection path, according to a particular embodiment of the present disclosure; -
FIG. 9 is a block diagram illustrating the operation of the network ofFIG. 3 when a working path recovers and a pending flow from a previous working path failure is admitted according, to a particular embodiment of the present disclosure; -
FIG. 10 is a block diagram illustrating the operation of the network ofFIG. 3 when a working path with a higher priority flow fails and a lower priority flow is dropped, according to a particular embodiment of the present disclosure; and -
FIG. 11 is a block diagram illustrating an example method for protection switching, according to a particular embodiment of the present disclosure. -
FIG. 1 is an example of a current (1:1)n protection architecture in a network as described in the ITU-T G808.1 specification. A network may include a plurality of network elements configured to transmit data on a plurality of working paths coupled to the network elements. In certain embodiments, the network includes network elements or nodes 100 that are communicatively coupled via working paths 120 andprotection path 150. However, any suitable configuration of any suitable number of network elements 100 may create the network. The network elements 100 may be located in similar or geographically disparate locations. Although the network is shown as a logical point-to-point network, the network may also be configured as a ring network, mesh network, or any other suitable network or combination of networks. - Network elements may be coupled via optical fiber, an Ethernet cable, a WiFi signal, or other suitable medium.
Network elements - Protection Switching (APS) signals. CCMs are uni-directional, broadcast messages that provide a means to check connectivity of paths in a network. Each working path and protection path has a unique CCM signal between network elements 100. The APS signal is a frame that contains information specific to the protection scheme and to switching data from the working path to the protection path. The APS signal may be transmitted periodically on the
protection path 150 during normal operation. When a working path failure occurs, the APS frame may be immediately transmitted between the network elements bounding the path. When there is a need to switch a flow 110 from a working path 120 to aprotection path 150, the APS frame may perform the handshaking between network elements 100. In addition, each working path has an associated flow. Flows 110 are the traffic or data transmitted on the working paths 120 andprotection path 150. Such traffic may comprise optical or electrical signals configured to encode audio, video, textual, and/or any other suitable data. In addition, each working path has a finite bandwidth. In the current example, workingpath 120 a has 400 MB, workingpath 120 b has 200 MB, workingpath 120 c has 100 MB and workingpath 120 d has 100 MB.Protection path 150 has a bandwidth equal to the bandwidth of the largest working path bandwidth that it is protecting. In this example, theprotection path 150 has bandwidth of at least 400 MB, which is the bandwidth of highestbandwidth working path 120 a. However, the bandwidth of each working path and the protection path may be any value suitable to meet the data transmission needs. Additionally, in the network, only one working path may be protected at a time. In the case of multiple working path failures, certain flows will not be protected. -
FIG. 2 is an illustration of the Automatic Protection Switching (APS) Frame for current protection schemes. Automatic Protection Switching is described in the ITU-T G.8031 specification and further defined in Telcordia GR-253. The ITU-T G.808.1 specification defines a required communication channel called the protection path or protection flow between two network elements. It is separate from the working entity or path and is used to synchronize the two network elements defining the boundaries of the protection path. In the frame shown in the example, the APS specific information is the following: Request/State 300,Protection Type 310, RequestedSignal 320 and BridgedSignal 330 as defined in the ITU-T G.8031 specification. There is also aReserved Field 340 that is not currently defined in the ITU-T G.8031 specification. The Request/State 300 is a four bit field which indicates the type of request in the switching algorithm. For example, the Request/State 300 may be “Forced Switch” as indicated by 1101 in the field or “Wait to Restore” as indicated by 0101 in the field. TheProtection Type 310 designates A, B, D or R which are defined as follows: A=APS or not, B=1:1 or 1+1 protection algorithm, D=bi-directional or uni-directional protection paths and R=revertive or not revertive. The Protection Type 310 (A and B bits) indicates to the network if Automatic Protection Switching is active and what type of protection scheme is active. The D bit provides further detail so that the network elements 100 know whether the data flow switched to the protection path is uni-directional or bi-directional. The RequestedSignal 320 indicates the request by the near end node to be switched over to the protection path. The BridgedSignal 330 indicates that the signal is switched by the near end node over the protection path. The RequestedSignal 320 and the BridgedSignal 330 allow thenetwork elements - For example, in the current protection scheme as described in
FIGS. 1 and 2 , if a connectivity failure was detected via the CCM signal on a working path, the APS mechanism may activate. An APS frame may be sent between network elements 100 to ensure that each node agrees to switch the traffic or flow from the working path failure to the protection path. For example,network element 100 a may send an - APS frame to network
element 100 b that has the “Requested Signal” 320 bit set.Network element 100 b receives the APS frame and returns an APS frame with the “Requested Signal” 320 bit set.Network element 100 a responds with another APS frame with both the “Requested Signal” 320 and the “Bridged Signal” 330 set.Network element 100 b receives the frame and responds with an APS frame with the same bits set. With the appropriate bits in the APS frame set, the network elements 100 are in agreement and the data switch occurs. The CCM signal for the working path with a failure may continue to be monitored. Once the CCM signal restores, a “Wait to Restore” will be set in the APS frame “Request/State” 300 field and the process described above may be repeated but the bits may be un-set instead of set. -
FIG. 3 is a block diagram illustrating an embodiment for a (1:1)n priority based protection scheme in a network. In the example scheme, multiple working paths may be protected and unique priorities may be assigned to the flows associated with each working path. The network is communicatively coupled via working paths 220 andprotection path 250 through network elements 200. In some embodiments, the working paths grouped with a particular protection path may be defined in the software of network elements 200. In other embodiments the working paths grouped with a particular protection path may be defined in hardware of network elements 200. Flows 210 are the data transmitted on the working paths 220. The working paths 220 inFIG. 3 have a finite bandwidth and the flows 210 have a unique priority. In the example embodiment, working paths 220 have the following bandwidth and priority: workingpath 220 a has 400 MB andPriority 1, workingpath 220 b has 200 MB andPriority 2, workingpath 220 c has 100 MB andPriority 3, and workingpath 220 d has 100 MB andPriority 4.Protection path 250 may have a bandwidth greater than or equal to the sum of the bandwidth of the largest working path bandwidth that it is protecting and the APS frame bandwidth. In this example, theprotection path 250 has a bandwidth of 500 MB which is greater than the 400 MB bandwidth of workingpath 220 a. In general, the protection path bandwidth may be greater than or equal to the bandwidth of the largest working path. - The
network elements FIG. 3 may be located in similar or geographically disparate locations. Thenetwork elements protection path 250. In addition, in this embodiment, the FAM and SMM may facilitate protecting more than one working path at a time. When there are multiple working path failures, for example, assigned priorities and available/required bandwidth may be used as decision criteria in the FAM when deciding which flow to protect. When multiple failures occur during the same time period, the flows 210 from the working paths 220 may be admitted to theprotection path 250 in decreasing order of priority. If the bandwidth of theprotection path 250 is fully utilized, the priority of the flow from the newly failed working path 220 may be used to pre-empt existing lower priority flows on theprotection path 250. When a working path 220 with the higher priority flow is restored, then the lower priority flow from working paths 220 with the failure will be given an opportunity to have the flow 210 be admitted on to theprotection path 250, provided the required bandwidth is available. Once the SMM has determined the traffic to allow on the protection path, the SMM will initiate APS frames to begin the switch of flows 210 from the failed working path 220 to theprotection path 250. This will be described in further detail in the descriptions of the Figures below. - Also shown in
FIG. 3 , the working paths 220 may have a Continuity Check Message (CCM) to indicate current status. The CCM is a standard Ethernet mechanism as described in IEEE 802.1ag that detects and signals connectivity failures, as described inFIG. 1 . For example, the CCM signal may be monitored and generated by a Fault Detection Module (FDM), not explicitly shown, that may be present on the processing resources of the network elements 200. A CCM signal may be broadcast, as an example, at a periodic rate of 3.3 ms. The CCM may be monitored to determine if a flow 210 needs to be switched to theprotection path 250. A failure of the CCM signal may be defined as a minimum of three missed CCM broadcasts. The APS signals for each working path 220 are transmitted by the APS State Machine Module (SMM) on theprotection path 250 when their associated working path has failed. The APS signals in the example embodiment are based on the ITU-T G.8031 specification, as illustrated inFIG. 2 . In the example embodiment, the standard - APS signal may be augmented to include information that creates an Flow Identifier (Flow ID) for a flow associated with a particular working path, as described below in conjunction with
FIG. 4 . The APS frame for each flow 210 is transmitted on theprotection path 250. -
FIG. 4 is an illustration of an example APS frame, according to a particular embodiment of the present disclosure. The 4th byte in the APS specific information may be used to carry theFlow ID 440 to represent a specific flow. TheFlow ID 440 may also be used to define the priority of the flow. To achieve priority based (1:1)n architecture for a network, the following fields in the APS specific section of the frame may be set to the following for the Protection Type 410: A=APS, B=1:1, D=Bi-directional, R=Revertive. The A bit shows that the APS mechanism will be used in the protection scheme (1:1) as indicated in bit B. The D bit set as bi-directional indicates that a working path failure will have both directions of data flow switched to the protection path. The R bit indicates that if a flow is present on a protection path, it will return to the working path if the path is restored. The RequestedSignal 420 and the BridgedSignal 430 may be a 0 or 1 to indicate a request and a transition to the protection path. These two bits may be used as a handshaking mechanism to allow to nodes of a network to negotiate switching a flow from the working path to the protection path. -
FIG. 5 is an illustration of the APS Frame for communicating APS information for multiple flows, according to a particular embodiment of the present disclosure. If the Type-Length-Value (TLV) Offset 500 and EndTLV 510 portion of the frame is utilized, then multiple APS signal information may be transmitted together on the protection path to facilitate multiple flows sharing a protection path. The TLV Offset 500 separates the APS frames for a specific flow. Within each APS frame the Flow ID 540 may identify the flow associated with this frame. TheEnd TLV 510 field indicates that end of the grouping of APS frames. In the embodiment shown inFIG. 5 , four working paths share a protection path. The APS signals associated with each flow may be transmitted periodically on the protection path. When a working path fails, the APS frame associated with its flow may have the appropriate bits set to begin the handshake mechanism between network elements. The non-failing working path APS frames may be unaffected. -
FIG. 6 is a block diagram illustrating an example of the network ofFIG. 3 when a single working path fails according to a particular embodiment of the present disclosure. In this example, a failure occurs in workingpath 220 c as indicated by a loss of CCM signal. The APS mechanism in the SMM is activated and communicates with the FAM to determine if there is bandwidth available. The FAM determines that workingpath 220 c has 100 MB of bandwidth. Since this is less than the 500 MB bandwidth of the protection path and no other traffic is on the protection path, the FAM allows theflow 210 c from workingpath 220 c to switch to theprotection path 250 regardless of the priority reflected in its APS signal. The FAM communicates to the SMM that the switch may occur. The SMM sends an APS frame fromnetwork element 200 a tonetwork element 200 b that has the “Requested Signal” bit set.Network element 200 b receives the APS frame and returns an APS frame with the “Requested Signal” bit set.Network element 200 a responds with another APS frame with both the “Requested Signal” and the “Bridged Signal” set.Network element 200 b receives the frame and responds with an APS frame with the same bits set. With the appropriate bits in the APS frame set, the network elements 200 are in agreement and the data switch occurs. Now the available bandwidth on theprotection path 250 is 400 MB. In this embodiment, the protection scheme is revertive therefore the CCM signal on the workingpath 220 c is constantly monitored. If the CCM is restored, thus indicating recovery of the working path, then the traffic would return to the working path. -
FIG. 7 continues illustrating the example of the network ofFIG. 6 when a second working path fails according to a particular embodiment of the present disclosure. As shown inFIG. 6 , workingpath 220 c has already failed and theflow 210 c has been admitted to theprotection path 250. In the example inFIG. 7 , a failure now occurs in working path flow 220 d as indicated by a loss of CCM signal. The FAM determines that workingpath 220 d has 100 MB of bandwidth and the protection path has 400 MB of available bandwidth. Since the protection path bandwidth is sufficient (400 MB >100 MB), the FAM allows workingpath 220 d to be admitted to theprotection path 250 regardless of the priority. The FAM indicates to the SMM to initiate the switch of traffic from the failed working path to the protection path. The traffic switch occurs with the APS frames as described inFIG. 6 . There is now 300 MB of available bandwidth onprotection path 250. -
FIG. 8 continues illustrating the example of the network ofFIG. 6 when a third working path fails according to a particular embodiment of the present disclosure. As shown inFIGS. 6 and 7 , workingpath 220 c and workingpath 220 d have already failed and been admitted to theprotection path 250. There is 300 MB of available bandwidth on theprotection path 250 when a loss of CCM signal indicates a failure occurred in workingpath 220 a. The SMM sends a request to the FAM to switch. The FAM determines that workingpath 220 a has a 400 MB bandwidth requirement which is larger than the available bandwidth (300 MB) of theprotection path 250. The FAM compares the priorities of the traffic from workingpaths path 220 a has the lowest priority signal so it is not admitted to theprotection path 250. The - FAM denies the switch and places the working path failure in the pending state for the protection path. The SMM sends an APS frame between
network elements flow 210 a from workingpath 220 a is not transmitted during the time it is in the pending state. The protection architecture does not track or maintain any knowledge of the data while the working path is in the fail condition. The CCM signal may be monitored to determine whether the working path is repaired and monitor the availability of the protection path in order to create a link for data transmission. -
FIG. 9 continues illustrating the example of the network ofFIG. 10 when a working path recovers and a pending flow from a previous failed working path is admitted to the protection path according to a particular embodiment of the present disclosure. As shown inFIGS. 6 , 7 and 8, workingpath 220 c and workingpath 220 d have already failed and their flows, 210 c and 210 d respectively, have been admitted to theprotection path 250. The flow's 210 a admittance to theprotection path 250 is pending due to insufficient bandwidth and lower priority. As discussed above, in this embodiment, the protection scheme is revertive therefore the CCM signal on the workingpath 220 c may be constantly monitored. The FAM recognizes that workingpath 220 c has recovered and communicates to the SMM to initiate the traffic switch back to the working path. The SMM sends an APS frame with “Wait to Restore” set in the “Request/State” field between network elements 200.Network element 200 a sends an APS frame to networkelement 200 b with the Requested Signal field set to zero.Network element 200 b responds with an APS frame with the Bridged Signal and Requested Signal set to zero. Workingpath 220 c is now transmittingflow 210 c. - The FAM recalculates the available bandwidth on the protection path and determines that there is now 400 MB of bandwidth available. Prior to working
path 220 c recovering, there was 300 MB of available bandwidth on theprotection path 250 and, sinceflow 210 c required 100 MB of bandwidth, there is now 400 MB of bandwidth available on theprotection path 250. The FAM determines that the pending data from workingpath 220 a can now be admitted since there is sufficient bandwidth on the protection path and no other higher priority fails pending. Onceflow 210 a is admitted, there is zero bandwidth available on theprotection path 250. - The FAM notifies the SMM to begin switching the traffic of working
path 220 a to the protection path. The switch offlow 210 a to theprotection path 250 occurs as described in the figures above. -
FIG. 10 continues illustrating the example of the network ofFIG. 9 when a working path with a higher priority flow fails and a lower priority flow is dropped from the protection path according to a particular embodiment of the present disclosure. As shown inFIGS. 6-10 , workingpath 220 c and workingpath 220 d have already failed and their respective flows have been admitted to theprotection path 250. Workingpath 220 a was pending until workingpath 220 c recovered and then flow 210 a was admitted to the protection path. There is zero available bandwidth when workingpath 220 b fails as indicated by its CCM signal. The FAM determines thatflow 210 b has a higher priority thanflow 210 a which is already transmitting on the protection path. The FAM also determines that ifflow 210 a is dropped, there will be sufficient bandwidth forflow 210 b. The FAM signals the SMM to initiate droppingflow 210 a from theprotection path 250 and admittingflow 210 b. There is now 200 MB of available 500 MB bandwidth on theprotection path 250 sinceflows 2+3+4 requires a total 200 MB+100 MB+100 MB=300 MB. The SMM initiates the APS mechanism and sends APS frames on theprotection path 250 for workingpath 220 a between network elements 200 with the appropriate bits in the “Request State” field set as described in the ITU-T G.8031 specification. The SMM notes that workingpath 220 a is not functional so it will be in the pending state. Flow 210 b will be admitted to the protection path with the APS handshaking mechanism described above. -
FIG. 11 is a block diagram illustrating an example method for protection switching, according to a particular embodiment of the present disclosure. Instep 300, the working paths are functional and monitored periodically to determine if there is a failure. Instep 304, if one or more failures have occurred there is a check for sufficient bandwidth. If there is sufficient bandwidth, then the flow(s) are switched to the protection path instep 306. Instep 307, the available bandwidth on the protected path is recalculated. Instep 308, the state of the failed working paths is monitored. If the failed path recovers, then the flow reverts back to the working path instep 310. Instep 311, the amount of available bandwidth on the protected path may be updated. In addition atstep 311, after the available bandwidth is updated, the pending flows will be checked instep 316. If there are pending flows in 316, then the process will continue atstep 304. If there is not sufficient bandwidth in 304, then instep 312, the priority of the flows is determined. Instep 314, if the newly failed flow is higher priority than one or more of flows currently on the protection path, determine instep 318 if dropping one or more of them provides sufficient bandwidth for the higher priority failed flow. If yes, then the lower priority failures are dropped instep 320 and placed in the pending queue to make room for the higher priority failed flow and the higher priority flow is switched to the protection path instep 306. If not, the current failure is in the pending state instep 313 and will be monitored instep 316 for admittance to the protection path. In addition atstep 314, if the new failure is not higher priority than the current fails on the protection path, then the latest failure is pending instep 313 until sufficient bandwidth is available as determined instep 304. - Although
FIG. 11 discloses a particular number of steps to be taken with respect to the method of implementing priority based Ethernet protection, the steps may be executed with more or fewer steps than those depicted inFIG. 11 . In addition, althoughFIGS. 5 through 10 disclose a certain order of steps that may be taken with respect to the method implementing priority based Ethernet protection, the steps comprising the method of implementing priority based Ethernet protection may be completed in any suitable order. - Although the present disclosure has been described with several embodiments, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims. For example, modifications, additions, or omissions may be made to the working paths, switches, signals and network described without departing from the scope of the disclosure.
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/101,615 US8830825B2 (en) | 2011-05-05 | 2011-05-05 | Method and system for priority based (1:1)n ethernet protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/101,615 US8830825B2 (en) | 2011-05-05 | 2011-05-05 | Method and system for priority based (1:1)n ethernet protection |
Publications (2)
Publication Number | Publication Date |
---|---|
US20120281525A1 true US20120281525A1 (en) | 2012-11-08 |
US8830825B2 US8830825B2 (en) | 2014-09-09 |
Family
ID=47090153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/101,615 Active 2032-12-29 US8830825B2 (en) | 2011-05-05 | 2011-05-05 | Method and system for priority based (1:1)n ethernet protection |
Country Status (1)
Country | Link |
---|---|
US (1) | US8830825B2 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120307628A1 (en) * | 2011-06-06 | 2012-12-06 | Fujitsu Limited | Communication apparatus and packet distribution method |
US20130242721A1 (en) * | 2012-03-19 | 2013-09-19 | Ciena Corporation | Retention of a sub-network connection home path |
US20140064064A1 (en) * | 2012-09-06 | 2014-03-06 | Electronics And Telecommunications Research Institute | Method and apparatus for protection switching |
US20150085647A1 (en) * | 2013-08-12 | 2015-03-26 | Nec Laboratories America, Inc. | Eliminating External Buffer for Hitless Protection by Using Channelized Flow Control |
US20150188625A1 (en) * | 2013-12-27 | 2015-07-02 | Electronics And Telecommunications Research Institute | Method for realizing time reduction in shared mesh network |
US9191272B2 (en) * | 2012-09-07 | 2015-11-17 | Electronics And Telecommunications Research Institute | Protection switching method and apparatus |
US20160112349A1 (en) * | 2014-10-16 | 2016-04-21 | Electronics And Telecommunications Research Institute | Method for providing protection switching service in virtual tenant network and controller therefor |
KR20160045003A (en) * | 2014-10-16 | 2016-04-26 | 한국전자통신연구원 | Method for protection switching service in virtual tenant network and controller |
US20160173384A1 (en) * | 2013-11-25 | 2016-06-16 | Huawei Technologies Co., Ltd. | Method and Device for Transmitting Network Packet |
CN109309530A (en) * | 2017-07-28 | 2019-02-05 | 中兴通讯股份有限公司 | A kind of data transmission method and device |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9729949B2 (en) * | 2014-04-23 | 2017-08-08 | Alcatel Lucent | Dynamic local decision control in software defined networking-based environment |
TWI661696B (en) * | 2018-01-04 | 2019-06-01 | Arcadyan Technology Corporation | Network path selection method and network node device using the same |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933422A (en) * | 1996-08-20 | 1999-08-03 | Nec Corporation | Communication network recoverable from link failure using prioritized recovery classes |
US6363319B1 (en) * | 1999-08-31 | 2002-03-26 | Nortel Networks Limited | Constraint-based route selection using biased cost |
US20030063560A1 (en) * | 2001-10-02 | 2003-04-03 | Fujitsu Network Communications, Inc. | Protection switching in a communications network employing label switching |
US20040179472A1 (en) * | 2003-03-14 | 2004-09-16 | Farid Khalilzadeh | Shared path protection method and system |
US20050237984A1 (en) * | 2004-04-21 | 2005-10-27 | Mathilde Benveniste | Organization of automatic power save delivery buffers at an access point |
US20060002292A1 (en) * | 2004-06-30 | 2006-01-05 | Zarlink Semiconductor Inc. | Method and apparatus providing rapid end-to-end failover in a packet switched communications network |
US20080259786A1 (en) * | 2001-09-04 | 2008-10-23 | Rumi Sheryar Gonda | System and method for supporting sdh/sonet aps on ethernet |
US7535831B2 (en) * | 2003-09-16 | 2009-05-19 | Nortel Networks Limited | Method and apparatus for providing grades of service for unprotected traffic in an optical network |
US20090232148A1 (en) * | 2008-03-13 | 2009-09-17 | Hideki Endo | Communication system |
US20100290340A1 (en) * | 2009-05-15 | 2010-11-18 | Electronics And Telecommunications Research Institute | Method for protection switching |
US20100312878A1 (en) * | 2009-06-09 | 2010-12-09 | Fujitsu Network Communications, Inc. | Providing Ring Protection For Access Networks |
US20120017110A1 (en) * | 2010-07-19 | 2012-01-19 | Verizon Patent And Licensing, Inc. | Fault-tolerance and resource management in a network |
US20120236710A1 (en) * | 2011-03-15 | 2012-09-20 | Fujitsu Limited | System and method for setting redundant path segments in a multi-ring communication network |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6859431B1 (en) | 2000-01-28 | 2005-02-22 | Ciena Corporation | System and method for calculating protection routes in a network prior to failure |
US7126908B1 (en) | 2001-07-31 | 2006-10-24 | Ciena Corporation | Method of protecting as against span failures in a communication network |
US7206281B2 (en) | 2002-05-03 | 2007-04-17 | Ciena Corporation | Calculating physical routes in a communication network |
-
2011
- 2011-05-05 US US13/101,615 patent/US8830825B2/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933422A (en) * | 1996-08-20 | 1999-08-03 | Nec Corporation | Communication network recoverable from link failure using prioritized recovery classes |
US6363319B1 (en) * | 1999-08-31 | 2002-03-26 | Nortel Networks Limited | Constraint-based route selection using biased cost |
US20080259786A1 (en) * | 2001-09-04 | 2008-10-23 | Rumi Sheryar Gonda | System and method for supporting sdh/sonet aps on ethernet |
US20030063560A1 (en) * | 2001-10-02 | 2003-04-03 | Fujitsu Network Communications, Inc. | Protection switching in a communications network employing label switching |
US20040179472A1 (en) * | 2003-03-14 | 2004-09-16 | Farid Khalilzadeh | Shared path protection method and system |
US7535831B2 (en) * | 2003-09-16 | 2009-05-19 | Nortel Networks Limited | Method and apparatus for providing grades of service for unprotected traffic in an optical network |
US20050237984A1 (en) * | 2004-04-21 | 2005-10-27 | Mathilde Benveniste | Organization of automatic power save delivery buffers at an access point |
US20060002292A1 (en) * | 2004-06-30 | 2006-01-05 | Zarlink Semiconductor Inc. | Method and apparatus providing rapid end-to-end failover in a packet switched communications network |
US20090232148A1 (en) * | 2008-03-13 | 2009-09-17 | Hideki Endo | Communication system |
US20100290340A1 (en) * | 2009-05-15 | 2010-11-18 | Electronics And Telecommunications Research Institute | Method for protection switching |
US20100312878A1 (en) * | 2009-06-09 | 2010-12-09 | Fujitsu Network Communications, Inc. | Providing Ring Protection For Access Networks |
US20120017110A1 (en) * | 2010-07-19 | 2012-01-19 | Verizon Patent And Licensing, Inc. | Fault-tolerance and resource management in a network |
US20120236710A1 (en) * | 2011-03-15 | 2012-09-20 | Fujitsu Limited | System and method for setting redundant path segments in a multi-ring communication network |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120307628A1 (en) * | 2011-06-06 | 2012-12-06 | Fujitsu Limited | Communication apparatus and packet distribution method |
US8780701B2 (en) * | 2011-06-06 | 2014-07-15 | Fujitsu Limited | Communication apparatus and packet distribution method |
US20130242721A1 (en) * | 2012-03-19 | 2013-09-19 | Ciena Corporation | Retention of a sub-network connection home path |
US9774493B2 (en) * | 2012-03-19 | 2017-09-26 | Ciena Corporation | Retention of a sub-network connection home path |
US9088486B2 (en) * | 2012-03-19 | 2015-07-21 | Ciena Corporation | Retention of a sub-network connection home path |
US20150319033A1 (en) * | 2012-03-19 | 2015-11-05 | Ciena Corporation | Retention of a sub-network connection home path |
US20140064064A1 (en) * | 2012-09-06 | 2014-03-06 | Electronics And Telecommunications Research Institute | Method and apparatus for protection switching |
US9515871B2 (en) * | 2012-09-06 | 2016-12-06 | Electronics And Telecommunications Research Institute | Method and apparatus for protection switching |
US9191272B2 (en) * | 2012-09-07 | 2015-11-17 | Electronics And Telecommunications Research Institute | Protection switching method and apparatus |
US20150085647A1 (en) * | 2013-08-12 | 2015-03-26 | Nec Laboratories America, Inc. | Eliminating External Buffer for Hitless Protection by Using Channelized Flow Control |
US20160173384A1 (en) * | 2013-11-25 | 2016-06-16 | Huawei Technologies Co., Ltd. | Method and Device for Transmitting Network Packet |
US10057175B2 (en) * | 2013-11-25 | 2018-08-21 | Huawei Technologies Co., Ltd. | Method and device for transmitting network packet |
US20150188625A1 (en) * | 2013-12-27 | 2015-07-02 | Electronics And Telecommunications Research Institute | Method for realizing time reduction in shared mesh network |
US20160112349A1 (en) * | 2014-10-16 | 2016-04-21 | Electronics And Telecommunications Research Institute | Method for providing protection switching service in virtual tenant network and controller therefor |
KR20160045003A (en) * | 2014-10-16 | 2016-04-26 | 한국전자통신연구원 | Method for protection switching service in virtual tenant network and controller |
US9935900B2 (en) * | 2014-10-16 | 2018-04-03 | Electronics And Telecommunications Research Institute | Method for providing protection switching service in virtual tenant network and controller therefor |
KR102288042B1 (en) * | 2014-10-16 | 2021-08-10 | 한국전자통신연구원 | Method for protection switching service in virtual tenant network and controller |
CN109309530A (en) * | 2017-07-28 | 2019-02-05 | 中兴通讯股份有限公司 | A kind of data transmission method and device |
Also Published As
Publication number | Publication date |
---|---|
US8830825B2 (en) | 2014-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8830825B2 (en) | Method and system for priority based (1:1)n ethernet protection | |
US6680912B1 (en) | Selecting a routing direction in a communications network using a cost metric | |
EP1262042B1 (en) | Routing switch for dynamically rerouting traffic due to detection of faulty link | |
US7957324B2 (en) | Utilizing bandwidth in ring network using path cost and protection techniques | |
JP7367795B2 (en) | Optical network management device | |
US6865149B1 (en) | Dynamically allocated ring protection and restoration technique | |
US9106523B2 (en) | Communication device and method of controlling the same | |
JP4835422B2 (en) | Network device and communication system | |
CN101252494B (en) | Equipment and method for sharing traffic load | |
JP2004533142A (en) | Reuse of bandwidth reservation in protection and restoration techniques for dynamically allocated rings | |
JP4588503B2 (en) | Communication system and communication method | |
KR102088298B1 (en) | Method and appratus for protection switching in packet transport system | |
CN103931145A (en) | Dynamic bandwidth adjustment in packet transport network | |
JP6269088B2 (en) | Redundant path providing method and transmission apparatus | |
CN103746841A (en) | Failure recovery method and controller | |
US20140219080A1 (en) | Method and apparatus for interworking protection switching | |
US20160204976A1 (en) | Identifying the absence and presence of a ring protection link owner node in an ethernet network | |
JP2007097011A (en) | Communication system, transmission apparatus and reservation band setting method | |
US20150172173A1 (en) | Communication system, communication apparatus and path switching method | |
EP2677702A2 (en) | A method and apparatus for load balance | |
JP4948320B2 (en) | Multi-ring RPR node device | |
JP2009231906A (en) | Data transmission system, transmission device and protection control method | |
RU2577782C2 (en) | Wireless receiving device, method of sending fault information and method for notification of fault information | |
CN103684811A (en) | Service protection method and system of composite link | |
JP2006311416A (en) | Data transmission system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU NETWORK COMMUNICATIONS, INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ADDANKI, VENKATA RAMANA KIRAN;SAHA, ARUN;JOSHI, MANDAR;REEL/FRAME:026231/0986 Effective date: 20110504 |
|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUJITSU NETWORK COMMUNICATIONS, INC.;REEL/FRAME:027385/0411 Effective date: 20111201 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |